CFP last date
20 January 2025
Reseach Article

Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman (RSA)

by Pahrul Irfan, Yudi Prayudi, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 6
Year of Publication: 2015
Authors: Pahrul Irfan, Yudi Prayudi, Imam Riadi
10.5120/ijca2015905344

Pahrul Irfan, Yudi Prayudi, Imam Riadi . Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman (RSA). International Journal of Computer Applications. 123, 6 ( August 2015), 11-16. DOI=10.5120/ijca2015905344

@article{ 10.5120/ijca2015905344,
author = { Pahrul Irfan, Yudi Prayudi, Imam Riadi },
title = { Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman (RSA) },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 6 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number6/21962-2015905344/ },
doi = { 10.5120/ijca2015905344 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:55.606039+05:30
%A Pahrul Irfan
%A Yudi Prayudi
%A Imam Riadi
%T Image Encryption using Combination of Chaotic System and Rivers Shamir Adleman (RSA)
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 6
%P 11-16
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. Various kinds of techniques for increase security data or information already is developed, one common way is by cryptographic techniques. Cryptography is science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. To compensate for increasing computing speeds increases, it takes more than one encryption algorithm to improve security of digital images. One way is by using algorithms to double cryptography do encryption and decryption. Cryptographic algorithm often used today and the proven strength specially the digital image is Algorithm with Chaos system. To improve security at the image then we use Additional algorithms namely Rivers algorithm Shamir Adleman (RSA) which known as the standard of cryptography algorithms. This research aims to optimize security bitmap image format by combining the two algorithms namely Chaos-based algorithms and RSA algorithm into one application. Experiments conducted show that the proposed algorithm possesses robust security features such as fairly uniform distribution, high sensitivity to both keys and plain images, almost ideal entropy, and the ability to highly de-correlate adjacent pixels in the cipher images. Furthermore, it has a large key space, and transform image to pure text file which greatly increases its security for image encryption applications.

References
  1. Amin, M., Abd El-Latif, A. A. (2010). Efficient modified RC5 based on chaos adapted to image encryption. Journal of Electronic Imaging, 19(1). doi:10.1117/1.3360179
  2. 13. Amin, M., Faragallah, O. S., & Abd El-Latif, A. A. (2010). A chaotic block cipher algorithm for image cryptosystems. Communications in Nonlinear Science and Numerical Simulation, 15, 3484–3497.
  3. Awad, A. dan Saadane, A. 2010. New Chaotic Permutation Methods for Image Encryption. IAENG International Journal of Computer Science
  4. El-latif, A. A. A., Li, L., Zhang, T., Wang, N., Song, X., & Niu, X. (2012). Digital Image Encryption Scheme Based on Multiple, 67–88. doi:10.1007/s11220-012-0071-z
  5. El-Fishawy, N., & Abu Zaid, O. M. (2007). Quality of encryption measurement of bitmap images with RC6, MRC6, and rijndael block cipher algorithms. International Journal of Network Security, 5(3), 241–251.
  6. Faragallah, O. S. (2011). An efficient block encryption cipher based on chaotic maps for secure multimedia applications. Information Security Journal: A Global Perspective, 20(3), 135–147.
  7. Gaur, E. A., & Gupta, E. M. (2014). Review : Image Encryption Using Chaos Based algorithms, 4(3), 904–907.
  8. Jolfaei A, Mirghadri A. (2011). Image Encryption Using Chaos and Block Cipher. Computer and Information Science. 4:1.
  9. Stallings, William. (2004). Cryptography and Network Security : Principles and Practice. Prentice-Hall, New Jersey
  10. Stinson, R, D. 2002. Cryptography Theory and Practice 2nd Edition. CRC Press Inc. Boca Raton, London
  11. Tang, Z., & Zhang, X. (2011). Secure Image Encryption without Size Limitation Using Arnold Transform and Random Strategies, 6(2), 202–206. doi:10.4304/jmm.6.2.202-206
  12. Taki, A. E., Deen, E., & Gobran, S. N. (2014). Digital Image Encryption Based on RSA Algorithm, 9(1), 69–73.
  13. Wang, X., Zhang, Y., & Bao, X. (2015). A Colour Image Encryption Scheme Using Permutation-Substitution Based on Chaos, 3877–3897. doi:10.3390/e17063877
  14. Younes, M A B , Jantan A. (2008). “Image Encryption Using Block-Based Transformation Algorithm”. IAENG International Journal of Computer Science. 35:1
Index Terms

Computer Science
Information Sciences

Keywords

Chaos cipher text bitmap image encryption RSA.